SlideShare a Scribd company logo
BK
TP.HCM
Outline
Cryptographic Attacks
▫ Frequency analysis
▫ Brute force attack
▫ Meet-in-the-middle attack
▫ Birthday attack
Network Attacks
▫ Replay attack
▫ Man-in-the-middle attack
▫ Denial-of-service attack
BK
TP.HCM
Frequency analysis
Frequency
analysis is the
study of the
frequency of letters
or groups of letters
in a ciphertext. The
method is used as
an aid to breaking
classical ciphers.
BK
TP.HCM
Brute force attack
brute force attack is a strategy used to break the
encryption of data. It involves traversing the search
space of possible keys until the correct key is found.
The amount of time required to break a 128-bit key is
also daunting. Each of the 2128
possibilities must be
checked. A device that could check a billion billion keys
(1018
) per second would still require about 1013
years to
exhaust the key space.
This is a thousand times longer than the age of the
universe, which is about 13,000,000,000 (1.3×1010
)
years.
BK
TP.HCM
Meet-in-the-middle attack (1/3)
for small x, we have (1 x) ex
.for small x, we have (1 x)
ex
.
for small x, we have (1 x)
ex
.
The attack works by encrypting from one end
and decrypting from the other end, thus meeting
in the middle.
Assume the attacker knows a set of plaintext
and ciphertext: P and C. That is:
BK
TP.HCM
Meet-in-the-middle attack (2/3)
for small x, we have (1 x) ex
.for small x, we have (1 x)
ex
.
for small x, we have (1 x)
ex
.
The attacker can then compute EK(P) for all
possible keys K and store the results in memory.
Afterwards he can decrypt the ciphertext by
computing DK(C) for each K.
Any matches between these two resulting sets
are likely to reveal the correct keys. (To speed
up the comparison, the EK(P) set is stored in an
in-memory lookup table, then each DK(C) can be
matched against the values in the lookup table
to find the candidate keys.)
BK
TP.HCM
Meet-in-the-middle attack (3/3)
for small x, we have (1 x) ex
.for small x, we have (1 x)
ex
.
for small x, we have (1 x)
ex
.
Once the matches are discovered, they can be
verified with a second test-set of plaintext and
ciphertext. If the keysize is n, this attack uses
only 2n + 1
encryptions (and O(2n
) space) in
contrast to the naive attack, which needs 22n
encryptions (but only O(1) space).
BK
TP.HCM
Birthday attack (1/6)
exploits the mathematics behind the birthday problem in
probability theory.
What is the minimum value of k such that the probability
is greater than 0.5 that at least two people in a group of
k people have the same birthday?
P(n, k) = Pr[at least one duplicate in k items, with each
item able to take on one of n equally likely values
between 1 and n]
we are looking for the smallest value of k such that
P(365, k) 0.5
BK
TP.HCM
Birthday attack (2/6)
the probability that there are no duplicates,
which we designate as Q(365, k)
the number of different ways is:
BK
TP.HCM
Birthday attack (3/6)
P(365, 23) = 0.5073. For k = 100, the probability
of at least one duplicate is 0.9999997.
BK
TP.HCM
Birthday attack (4/6)
for small x, we have
(1 - x) ≅ ex
.
BK
TP.HCM
Birthday attack (5/6)
BK
TP.HCM
Birthday attack (6/6)
What value of k is required such that P(n, k)
0.5? To satisfy the requirement, we have:
For large k, we can replace k x (k -1) by k2
, and
we get
As a reality check, for n = 365, we get
which is very close to the
correct answer of 23.
BK
TP.HCM
Replay attack (1/2)
Use a simple method of exploiting a captured packet or
packets, and resend that traffic to cause unexpected
results.
Suppose Alice wants to prove her identity to Bob. Bob
requests her password as proof of identity, which Alice
dutifully provides (possibly after some transformation like
a hash function); meanwhile, Mallory is eavesdropping
the conversation and keeps the password. After the
interchange is over, Mallory connects to Bob posing as
Alice; when asked for a proof of identity, Mallory sends
Alice's password read from the last session, which Bob
accepts.
BK
TP.HCM
Replay attack (2/2)
A way to avoid replay attacks is using session tokens,
session tokens should be chosen by a (pseudo-) random
process.
Timestamping is another way of preventing a replay
attack. The advantage of this scheme is that does not
need to generate (pseudo-) random numbers.
BK
TP.HCM
Man-in-the-middle attack
The man-in-the middle attack intercepts a communication between
two systems
Once the TCP connection is intercepted, the attacker acts as a proxy,
being able to read, insert and modify the data in the intercepted
communication.
Various defenses against MITM attacks use authentication technique
that are based on PKI (Public Key Infrastructure)
BK
TP.HCM
Denial-of-service attack
DoS attack or DDoS is an
attempt to make a computer
resource unavailable to its
intended users.
Methods of attack
▫ ICMP flood
▫ Teardrop Attacks
▫ Peer-to-peer attacks
▫ …

More Related Content

DOCX
Symmetric ciphers questions and answers
PPTX
Substitution cipher and Its Cryptanalysis
PPTX
Symmetric ciphermodel
PPTX
Cryptography using probability
PDF
An Introduction to RSA Public-Key Cryptography
PDF
Detailed cryptographic analysis of contact tracing protocols
PPTX
Symmetric Encryption Techniques
PPTX
Enhancing security in cloud storage
Symmetric ciphers questions and answers
Substitution cipher and Its Cryptanalysis
Symmetric ciphermodel
Cryptography using probability
An Introduction to RSA Public-Key Cryptography
Detailed cryptographic analysis of contact tracing protocols
Symmetric Encryption Techniques
Enhancing security in cloud storage

What's hot (20)

PDF
A survey on Fully Homomorphic Encryption
PDF
3 des
PPTX
Caesar cipher
PDF
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
PDF
Network Security UNIT-II
PDF
Data Protection Techniques and Cryptography
PPT
Stallings Kurose and Ross
PDF
Presentation on Cryptography_Based on IEEE_Paper
PPTX
Cypher technique
PDF
Narrow bicliquesppt
PPTX
Transposition Chiper (Grid)
PDF
symmetric key encryption algorithms
PPTX
Introduction to cryptography and types of ciphers
PPTX
Classical cryptographic techniques, Feistel cipher structure
PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
PPTX
Hacking cryptography: 0xdec0de01 cryptoCTF solutions and a bit more - Владими...
PDF
Chapter 3-block-cipher-des1
PPTX
Modern Block Cipher- Modern Symmetric-Key Cipher
PDF
Errors errors, everywhere! - JSession
A survey on Fully Homomorphic Encryption
3 des
Caesar cipher
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
Network Security UNIT-II
Data Protection Techniques and Cryptography
Stallings Kurose and Ross
Presentation on Cryptography_Based on IEEE_Paper
Cypher technique
Narrow bicliquesppt
Transposition Chiper (Grid)
symmetric key encryption algorithms
Introduction to cryptography and types of ciphers
Classical cryptographic techniques, Feistel cipher structure
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Hacking cryptography: 0xdec0de01 cryptoCTF solutions and a bit more - Владими...
Chapter 3-block-cipher-des1
Modern Block Cipher- Modern Symmetric-Key Cipher
Errors errors, everywhere! - JSession
Ad

Viewers also liked (20)

PPT
Network Security
PPT
Network security
PDF
Network Security & Attacks
PPT
Network Attacks
PPTX
Network Security: Attacks, Tools and Techniques
PPT
Network Security
PDF
Network Security Presentation
PPTX
Breaking DES
PPTX
Network security
PPTX
PACE-IT: Common Network Security Issues
PPTX
Types of netwok_ispravlennaya-ispravlennaya
PPT
Digital Signiture
PPT
Network Security
PPT
Critical Security And Compliance Issues In Internet Banking
DOC
PDF
DISSERTATION_40096050
PDF
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
PDF
Compiler Design File
PDF
introduction to cryptography and its role in information technology era
PPT
Cyptography and network security
Network Security
Network security
Network Security & Attacks
Network Attacks
Network Security: Attacks, Tools and Techniques
Network Security
Network Security Presentation
Breaking DES
Network security
PACE-IT: Common Network Security Issues
Types of netwok_ispravlennaya-ispravlennaya
Digital Signiture
Network Security
Critical Security And Compliance Issues In Internet Banking
DISSERTATION_40096050
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
Compiler Design File
introduction to cryptography and its role in information technology era
Cyptography and network security
Ad

Similar to Network security attacks (20)

PPTX
2 Mathematics of Cryptographyy chapter 2
PDF
2 Unit 1. Traditional Symmetric Ciphers.pdf
PPTX
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
PDF
Cryptography 202
PPTX
Classical$ nn Encryption Techniques.pptx
PPTX
forth lecture of the information retrieval and management partB_2025.pptx
PPT
engineering electronics and communication
PPT
Ch02 classic nemo
PPTX
Information and data security cryptanalysis method
PPT
ch_03 Traditional ciphering (1).ppt.xxxxxxxxx
PPTX
Digital signatures
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Cryptography-101
PPTX
PPTX
DOC
Solutions crypto4e
PDF
Essay On Cryptography
PPTX
moudule-1classical Encyption Techniques.pptx
PPT
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
PPT
ch-03.ppt
2 Mathematics of Cryptographyy chapter 2
2 Unit 1. Traditional Symmetric Ciphers.pdf
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
Cryptography 202
Classical$ nn Encryption Techniques.pptx
forth lecture of the information retrieval and management partB_2025.pptx
engineering electronics and communication
Ch02 classic nemo
Information and data security cryptanalysis method
ch_03 Traditional ciphering (1).ppt.xxxxxxxxx
Digital signatures
Information and network security 38 birthday attacks and security of hash fun...
Cryptography-101
Solutions crypto4e
Essay On Cryptography
moudule-1classical Encyption Techniques.pptx
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
ch-03.ppt

More from Hoang Nguyen (20)

PPTX
Rest api to integrate with your site
PPTX
How to build a rest api
PPTX
Api crash
PPTX
Smm and caching
PPTX
Optimizing shared caches in chip multiprocessors
PPTX
How analysis services caching works
PPTX
Hardware managed cache
PPTX
Directory based cache coherence
PPTX
Cache recap
PPTX
Python your new best friend
PPTX
Python language data types
PPTX
Python basics
PPTX
Programming for engineers in python
PPTX
Learning python
PPTX
Extending burp with python
PPTX
Cobol, lisp, and python
PPT
Object oriented programming using c++
PPTX
Object oriented analysis
PPTX
Object model
PPTX
Data structures and algorithms
Rest api to integrate with your site
How to build a rest api
Api crash
Smm and caching
Optimizing shared caches in chip multiprocessors
How analysis services caching works
Hardware managed cache
Directory based cache coherence
Cache recap
Python your new best friend
Python language data types
Python basics
Programming for engineers in python
Learning python
Extending burp with python
Cobol, lisp, and python
Object oriented programming using c++
Object oriented analysis
Object model
Data structures and algorithms

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
sap open course for s4hana steps from ECC to s4
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Network security attacks

  • 1. BK TP.HCM Outline Cryptographic Attacks ▫ Frequency analysis ▫ Brute force attack ▫ Meet-in-the-middle attack ▫ Birthday attack Network Attacks ▫ Replay attack ▫ Man-in-the-middle attack ▫ Denial-of-service attack
  • 2. BK TP.HCM Frequency analysis Frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.
  • 3. BK TP.HCM Brute force attack brute force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found. The amount of time required to break a 128-bit key is also daunting. Each of the 2128 possibilities must be checked. A device that could check a billion billion keys (1018 ) per second would still require about 1013 years to exhaust the key space. This is a thousand times longer than the age of the universe, which is about 13,000,000,000 (1.3×1010 ) years.
  • 4. BK TP.HCM Meet-in-the-middle attack (1/3) for small x, we have (1 x) ex .for small x, we have (1 x) ex . for small x, we have (1 x) ex . The attack works by encrypting from one end and decrypting from the other end, thus meeting in the middle. Assume the attacker knows a set of plaintext and ciphertext: P and C. That is:
  • 5. BK TP.HCM Meet-in-the-middle attack (2/3) for small x, we have (1 x) ex .for small x, we have (1 x) ex . for small x, we have (1 x) ex . The attacker can then compute EK(P) for all possible keys K and store the results in memory. Afterwards he can decrypt the ciphertext by computing DK(C) for each K. Any matches between these two resulting sets are likely to reveal the correct keys. (To speed up the comparison, the EK(P) set is stored in an in-memory lookup table, then each DK(C) can be matched against the values in the lookup table to find the candidate keys.)
  • 6. BK TP.HCM Meet-in-the-middle attack (3/3) for small x, we have (1 x) ex .for small x, we have (1 x) ex . for small x, we have (1 x) ex . Once the matches are discovered, they can be verified with a second test-set of plaintext and ciphertext. If the keysize is n, this attack uses only 2n + 1 encryptions (and O(2n ) space) in contrast to the naive attack, which needs 22n encryptions (but only O(1) space).
  • 7. BK TP.HCM Birthday attack (1/6) exploits the mathematics behind the birthday problem in probability theory. What is the minimum value of k such that the probability is greater than 0.5 that at least two people in a group of k people have the same birthday? P(n, k) = Pr[at least one duplicate in k items, with each item able to take on one of n equally likely values between 1 and n] we are looking for the smallest value of k such that P(365, k) 0.5
  • 8. BK TP.HCM Birthday attack (2/6) the probability that there are no duplicates, which we designate as Q(365, k) the number of different ways is:
  • 9. BK TP.HCM Birthday attack (3/6) P(365, 23) = 0.5073. For k = 100, the probability of at least one duplicate is 0.9999997.
  • 10. BK TP.HCM Birthday attack (4/6) for small x, we have (1 - x) ≅ ex .
  • 12. BK TP.HCM Birthday attack (6/6) What value of k is required such that P(n, k) 0.5? To satisfy the requirement, we have: For large k, we can replace k x (k -1) by k2 , and we get As a reality check, for n = 365, we get which is very close to the correct answer of 23.
  • 13. BK TP.HCM Replay attack (1/2) Use a simple method of exploiting a captured packet or packets, and resend that traffic to cause unexpected results. Suppose Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Mallory is eavesdropping the conversation and keeps the password. After the interchange is over, Mallory connects to Bob posing as Alice; when asked for a proof of identity, Mallory sends Alice's password read from the last session, which Bob accepts.
  • 14. BK TP.HCM Replay attack (2/2) A way to avoid replay attacks is using session tokens, session tokens should be chosen by a (pseudo-) random process. Timestamping is another way of preventing a replay attack. The advantage of this scheme is that does not need to generate (pseudo-) random numbers.
  • 15. BK TP.HCM Man-in-the-middle attack The man-in-the middle attack intercepts a communication between two systems Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication. Various defenses against MITM attacks use authentication technique that are based on PKI (Public Key Infrastructure)
  • 16. BK TP.HCM Denial-of-service attack DoS attack or DDoS is an attempt to make a computer resource unavailable to its intended users. Methods of attack ▫ ICMP flood ▫ Teardrop Attacks ▫ Peer-to-peer attacks ▫ …